Sciweavers

607 search results - page 84 / 122
» Unifying Exact Completions
Sort
View
PSD
2004
Springer
126views Database» more  PSD 2004»
15 years 4 months ago
Outlier Protection in Continuous Microdata Masking
Abstract. Masking methods protect data sets against disclosure by perturbing the original values before publication. Masking causes some information loss (masked data are not exact...
Josep Maria Mateo-Sanz, Francesc Sebé, Jose...
DSN
2003
IEEE
15 years 4 months ago
N-Way Fail-Over Infrastructure for Reliable Servers and Routers
Maintaining the availability of critical servers and routers is an important concern for many organizations. At the lowest level, IP addresses represent the global namespace by wh...
Yair Amir, Ryan Caudy, Ashima Munjal, Theo Schloss...
RTCSA
2000
IEEE
15 years 3 months ago
Optimal scheduling of imprecise computation tasks in the presence of multiple faults
With the advance of applications such as multimedia, imagelspeech processing and real-time AI, real-time computing models allowing to express the “timeliness versus precision”...
Hakan Aydin, Rami G. Melhem, Daniel Mossé
SRDS
2000
IEEE
15 years 3 months ago
Modeling Fault-Tolerant Mobile Agent Execution as a Sequence of Agreement Problems
Fault-tolerance is fundamental to the further development of mobile agent applications. In the context of mobile agents, fault-tolerance prevents a partial or complete loss of the...
Stefan Pleisch, André Schiper
ITC
1998
IEEE
114views Hardware» more  ITC 1998»
15 years 3 months ago
BETSY: synthesizing circuits for a specified BIST environment
This paper presents a logic synthesis tool called BETSY (BIST Environment Testable Synthesis) for synthesizing circuits that achieve complete (100%)fault coverage in a user specif...
Zhe Zhao, Bahram Pouya, Nur A. Touba